How To Fix A Faulty Server On A Linux Computer (Unix) On A Pc Or Mac (Windows) On An Unix Computer (Windows 2) On The Same Day (Apple) On 08/28/08 (Apple Mac)

Size: px
Start display at page:

Download "How To Fix A Faulty Server On A Linux Computer (Unix) On A Pc Or Mac (Windows) On An Unix Computer (Windows 2) On The Same Day (Apple) On 08/28/08 (Apple Mac)"

Transcription

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34 GET / HTTP/1.0 HTTP/ Bad Request Date: Thu, 28 Aug :24:58 GMT Server: Apache/ (Unix) mod_perl/1.29 mod_ssl/ OpenSSL/0.9.7g Connection: close Content-Type: text/html; charset=iso

35

36

37

38

39 /.../carlog argos.csi /.../carlog v0.1.3 Copyright(c) G Portokalidis Net tracker data: YES VERSION ARCH TYPE TIMESTAMP 0x02 i386 RET EAX ECX EDX EBX 0x x000a79e0 0x00085a0e 0x007df83c (0x ) (0x ) (0x ) (0x ) [ ] [ ] [ ] [ ] ESP EBP ESI EDI 0x007df79c 0x x x007df8a4 (0x ) (0x0bcd978c) (0x ) (0x ) [ ] [ ] [ ] [ ] EIP Faulty EIP EFLAGS 0x d 0x75879a8d 0x (0x0bcd9790) [ ]

40 /.../cargos-lib-0.1.3/bin/carlog argos.csi argos.netlog /.../cargos-lib-0.1.3/bin/carlog v0.1.3 Copyright(c) G Portokalidis

41 Net tracker data: YES VERSION ARCH TYPE TIMESTAMP 0x02 i386 RET EAX ECX EDX EBX 0x x77e79e1b 0x745b30e0 0x00ebfd50 (0x ) (0x ) (0x ) (0x ) [ 77046] [ 77046] [ 77046] [ 77046] ESP EBP ESI EDI 0x00ebf87c 0x x x (0x ) (0x0ba49868) (0x ) (0x ) [ 77046] [ ] [ 77046] [ 77046] EIP Faulty EIP EFLAGS 0x x745937d8 0x (0x0ba4986c) [411628]

42 >strings argos.csi [tP NTLMSSP.B#~.B#~ Xhttp:// :3311/x.exe Mozilla/4.0,0F4.beg.q )Fk7_ %**f Xhttp:// :3311/x.exe Mozilla/4.0,0F4.beg.q )Fk7_ %**f

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73 #relayctl show sum Id Type Name Avlblty Status 1 relay http_relay active 1 table http_servers:80 active (5 hosts up) 1 host % down 2 host % up 3 host % up 4 host % up 5 host % up 6 host % up #relayctl show sum Id Type Name Avlblty Status 3 relay dce_relay active 3 table dce_servers:135 active (4 hosts up) 11 host % up 12 host % up 13 host % up 14 host % up

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104 # file relayd.conf # $Id$ # # Macros # vm_host_1= "xxx.xxx.xxx.xxx" vm_host_2= "yyy.yyy.yyy.yyy"... vm_host_n= "zzz.zzz.zzz.zzz" admin_if= "vge0" admin_ip= " " ext_honeynet_if="em0" ext_honeynet_ip=" " int_honeynet_if="em1" int_honeynet_ip=" " loopback= "lo0" loopback_ip= " " # # Global Options # interval 20 timeout 1000 prefork 1 log updates # # tables # table <virtuel_machines> { $vm_host_1 $vm_host_2 \ $external_honeypot $webserver_tv $webserver_jst } # # protocols # protocol "myssh" { tcp { nodelay, socket buffer } } http protocol "http_add" {

105 } header append "$REMOTE_ADDR" to "X-Forwarded-For" header append "$SERVER_ADDR:$SERVER_PORT" to "X-Forwarded-By" # # relays # relay "http_relay" { listen on port 80 forward to <virtuel_machines> port 80 mode roundrobin check tcp } relay "ftp_relay" { listen on port 21 forward to <virtuel_machines> port 21 mode roundrobin check tcp } relay "ms_sql_relay" { listen on port 1433 forward to <virtuel_machines> port 1433 mode roundrobin check tcp } # file pf.conf # $Id: pf.conf,v /09/01 13:04:21 root Exp $ # The sample configuration redirects connections targerted to # the network /28 to the Windows 2000 Honeypot and # to the Windows XP Honeypot # In addition, connections to tcp/80 are redirected to the # application proxy gateway of the relayd load balancer ext_honeynet_if="em0" int_honeynet_if="em1" loopback_if= "lo0"... vm_winxp= " " vm_win2000= " "... # # rdr & nat section # # rdr-anchor for relayd, for host monitoring and server load balancing rdr-anchor "relayd/*" # redirect incoming honeynet packets to port 80 to # proxy listening at localhost port 8080, this is a # really layer 7 proxy implemented by relayd # (relayd listens on , so the connection

106 # is redirected by it) rdr pass on $ext_honeynet_if inet proto tcp \ from any to /28 port http -> port http rdr pass on $ext_honeynet_if inet proto tcp \ from any to /28 port ftp -> port ftp rdr pass on $ext_honeynet_if inet proto tcp \ from any to /28 port ms-sql-s -> port mssql-s... # redirect incoming honeynet-packets to vm_win2000 # network range: /28 rdr pass on $ext_honeynet_if inet proto { icmp tcp udp } \ from any to /28 -> $vm_win2000 # redirect incoming honeynet-packets to vm_winxp # network range rdr pass on $ext_honeynet_if inet proto { icmp tcp udp } \ from any to { / /24 } -> $vm_winxp... # anchor point for relayd - permits relayd to place its ouwn rules into # the ruleset. anchor "relayd/*"... # pass out all connections initiated by relayd pass out quick on $ext_honeynet_if from any to any user _relayd \ keep state \ label "$srcaddr:$srcport:$dstaddr:$dstport:$proto:$if"

107 resource services { # write IO is reported as completed, if we know it has reached # _both_ local and remote DISK. protocol C; # what should be done in case the cluster starts up in degraded # mode, but # knows it has inconsistent data. incon-degr-cmd "echo '!DRBD! pri on incon-degr' wall ; sleep 60 ; halt -f"; # Wait for connection timeout if this node was a degraded cluster. # In case a degraded cluster (= cluster with only one node left) is # rebooted, this timeout value is used. startup { degr-wfc-timeout 120; } # If the lower level device reports io-error, the node drops its # backing storage device, and continues in disk less mode. disk { on-io-error detach; } net { } syncer { # Limit the bandwith used by the resynchronisation process. rate 10M;

108 } # All devices in one group are resynchronized parallel. group 1; # Configures the size of the active set. al-extents 257; # Definition of devices on hosts on dbserver1 { device /dev/drbd0; disk /dev/sda7; address :7788; meta-disk internal; } } on dbserver2 { device /dev/drbd0; disk /dev/sda3; address :7788; meta-disk internal; } <master_slave id="ms_drbd" notify="true" globally_unique="false"> <meta_attributes id="ms_drbd_meta_attrs"> <attributes> <nvpair id="ms_drbd_meta_attrs_clone_max" name="clone_max" value="2"/> <nvpair id="ms_drbd_meta_attrs_clone_node_max" name="clone_node_max" value="1"/> <nvpair id="ms_drbd_meta_attrs_master_max" name="master_max" value="1"/> <nvpair id="ms_drbd_meta_attrs_master_node_max" name="master_node_max" value="1"/> <nvpair id="ms_drbd_meta_attrs_notify" name="notify" value="true"/> <nvpair id="ms_drbd_meta_attrs_globally_unique" name="globally_unique" value="false"/> </attributes> </meta_attributes> <primitive id="resource_drbd" class="ocf" type="drbd" provider="heartbeat"> <instance_attributes id="resource_drbd"> <attributes> <nvpair id="resource_drbd_attrs_drbd_resource" name="drbd_resource" value="services"/> </attributes> </instance_attributes> <operations>

109 <op id="op_drbd" name="monitor" interval="60s" timeout="20s" disabled="false" role="started" prereq="quorum" on_fail="restart"/> </operations> </primitive> </master_slave> <group id="group_openca"> <primitive class="ocf" type="filesystem" provider="heartbeat" id="resource_filesystem"> <instance_attributes id="resource_filesystem_instance_attrs"> <attributes> <nvpair id="resource_filesystem_instance_attr_fstype" name="fstype" value="ext3"/> <nvpair id="resource_filesystem_instance_attr_device" name="device" value="/dev/drbd0"/> <nvpair id="resource_filesystem_instance_attr_directory" name="directory" value="/services"/> </attributes> </instance_attributes> <operations> <op id="op_filesystem" name="monitor" interval="60s" timeout="20s" disabled="false" role="started" prereq="quorum" on_fail="restart"/> </operations> </primitive> <primitive id="resource_ip" class="ocf" type="ipaddr2" provider="heartbeat"> <instance_attributes id="resource_ip_instance_attrs"> <attributes> <nvpair id="resource_ip_instance_attr_ip" name="ip" value=" "/> <nvpair id="resource_ip_instance_attr_interface" name="nic" value="eth1:0"/> <nvpair id="resource_ip_instance_attr_cidr_netmask" name="cidr_netmask" value="28"/> </attributes> </instance_attributes> <operations> <op id="op_ip" name="monitor" interval="60s" timeout="20s" disabled="false" role="started" prereq="quorum" on_fail="restart"/> </operations> </primitive> <primitive id="resource_mysql" class="ocf" type="mysql" provider="heartbeat"> <instance_attributes id="resource_mysql_instance_attrs"> <attributes>

110 <nvpair id="resource_mysql_instance_attr_binary" name="binary" value="/usr/bin/safe_mysqld"/> <nvpair id="resource_mysql_instance_attr_config" name="config" value="/etc/my.cnf"/> <nvpair id="resource_mysql_instance_attr_datadir" name="datadir" value="/var/lib/mysql"/> </attributes> </instance_attributes> <operations> <op id="op_mysql" name="monitor" interval="60s" timeout="120s" disabled="false" role="started" prereq="quorum" on_fail="restart"/> </operations> </primitive> <primitive id="resource_apache" class="ocf" type="apache" provider="heartbeat"> <instance_attributes id="resource_apache_instance_attrs"> <attributes> <nvpair id="resource_apache_instance_attr_config_file" name="configfile" value="/etc/apache2/httpd.conf"/> <nvpair id="resource_apache_instance_attr_httpd" name="httpd" value="/usr/sbin/httpd2"/> <nvpair id="resource_apache_instance_attr_options" name="options" value="-d SSL"/> </attributes> </instance_attributes> <operations> <op id="op_apache" name="monitor" interval="60s" timeout="20s" disabled="false" role="started" prereq="quorum" on_fail="restart"/> </operations> </primitive> <primitive id="resource_openca" class="ocf" type="openca" provider="heartbeat"> <instance_attributes id="resource_openca_instance_attrs"> <attributes> <nvpair id="resource_openca_instance_attr_server_path" name="serverpath" value="/services/inst/openca/server"/> </attributes> </instance_attributes> </primitive> </group> # UDP port for communication udpport 694 autojoin none

111 crm true # Heartbeat via Ethernet: bcast eth0 # Heartbeat via serial line serial /dev/ttys0 baud # Members of cluster node dbserver1 node dbserver2 logfile /var/log/ha-log respawn root /sbin/evmsd apiauth evms uid=hacluster,root

Relayd: a load-balancer for OpenBSD

Relayd: a load-balancer for OpenBSD Relayd: a load-balancer for OpenBSD Giovanni Bechis giovanni@openbsd.org University of Applied Sciences, Vienna, Austria May 5, 2012 what is relayd useful for? Reverse proxy Ssl accelerated reverse proxy

More information

High Availability with DRBD & Heartbeat. Chris Barber http://www.cb1inc.com

High Availability with DRBD & Heartbeat. Chris Barber http://www.cb1inc.com High Availability with DRBD & Heartbeat Chris Barber http://www.cb1inc.com What is DRBD? Distributed Replicated Block Device RAID 1 mirror across network Realtime replications Linux-only kernel module

More information

High Availability, Replicating, Load Balanced MySQL Databases Oliver Hookins Systems Administrator Network Fixinator Script Hacker All round su

High Availability, Replicating, Load Balanced MySQL Databases Oliver Hookins Systems Administrator Network Fixinator Script Hacker All round su Linux Conf AU 2008 High Availability, Replicating, Load Balanced MySQL Databases Oliver Hookins Systems Administrator Network Fixinator Script Hacker All round super fun guy Background Who Am I, And How

More information

Recent work in OpenBSD relayd AsiaBSDCon 2013 Reyk Flöter (reyk@openbsd.org)

Recent work in OpenBSD relayd AsiaBSDCon 2013 Reyk Flöter (reyk@openbsd.org) Recent work in OpenBSD relayd AsiaBSDCon 2013 Reyk Flöter (reyk@openbsd.org) Agenda History & Background Recent work SSL Interception Socket Splicing Filter rewrite relayd buzzword bingo Load Balancer

More information

Building Elastix-2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC)

Building Elastix-2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC) Building Elastix2.4 High Availability Clusters with DRBD and Heartbeat (using a single NIC) This information has been modified and updated by Nick Ross. Please refer to the original document found at:

More information

Open-Xchange Server High Availability

Open-Xchange Server High Availability OPEN-XCHANGE Whitepaper Open-Xchange Server High Availability High Availability Concept for OX Example Configuration v1.00 Copyright 2005, OPEN-XCHANGE Inc. This document is the intellectual property of

More information

How to Make the Client IP Address Available to the Back-end Server

How to Make the Client IP Address Available to the Back-end Server How to Make the Client IP Address Available to the Back-end Server For Layer 4 - UDP and Layer 4 - TCP services, the actual client IP address is passed to the server in the TCP header. No further configuration

More information

Load Balancing Trend Micro InterScan Web Gateway

Load Balancing Trend Micro InterScan Web Gateway Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning

More information

Load Balancing Sophos Web Gateway. Deployment Guide

Load Balancing Sophos Web Gateway. Deployment Guide Load Balancing Sophos Web Gateway Deployment Guide rev. 1.0.9 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

Load Balancing Bloxx Web Filter. Deployment Guide

Load Balancing Bloxx Web Filter. Deployment Guide Load Balancing Bloxx Web Filter Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org

More information

High Availability Low Dollar Load Balancing

High Availability Low Dollar Load Balancing High Availability Low Dollar Load Balancing Simon Karpen System Architect, VoiceThread skarpen@voicethread.com Via Karpen Internet Systems skarpen@karpeninternet.com These slides are licensed under the

More information

Load Balancing McAfee Web Gateway. Deployment Guide

Load Balancing McAfee Web Gateway. Deployment Guide Load Balancing McAfee Web Gateway Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved.

MarkLogic Server. Database Replication Guide. MarkLogic 8 February, 2015. Copyright 2015 MarkLogic Corporation. All rights reserved. Database Replication Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Database Replication

More information

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file

More information

Prerequisites. Creating Profiles

Prerequisites. Creating Profiles Prerequisites Make sure you have the following prerequisites completed: Determine what the FQDN will be and what virtual IP Address will be used. Add the FQDN and virtual IP into your company's DNS. Create

More information

WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide

WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide Rev 0.2 This document describes how to make your own Configuration Tool for WIZ100SR, WIZ105SR and WIZ110SR of WIZnet. And

More information

High availability infrastructures for TYPO3 Websites

High availability infrastructures for TYPO3 Websites 1 High availability infrastructures for TYPO3 Websites Luc de Louw bit heads GmbH, Internet Services, Rosengartenstrasse 72, CH 8037 Zürich, Switzerland. luc.delouw@bit heads.ch Abstract. The best content

More information

Appliance Quick Start Guide. v7.6

Appliance Quick Start Guide. v7.6 Appliance Quick Start Guide v7.6 rev. 1.0.7 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents Loadbalancer.org Terminology... 4 What is a Virtual IP Address?... 5 What is a Floating IP Address?...

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

BorderWare Firewall Server 7.1. Release Notes

BorderWare Firewall Server 7.1. Release Notes BorderWare Firewall Server 7.1 Release Notes BorderWare Technologies is pleased to announce the release of version 7.1 of the BorderWare Firewall Server. This release includes following new features and

More information

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8. TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure

More information

Load Balancing Clearswift Secure Web Gateway

Load Balancing Clearswift Secure Web Gateway Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Firewall 1 Basic firewall concept Roadmap Filtering firewall Proxy firewall Network Address Translation

More information

FreeBSD Firewalls SS- E 2014. Kevin Chege ISOC

FreeBSD Firewalls SS- E 2014. Kevin Chege ISOC FreeBSD Firewalls SS- E 2014 Kevin Chege ISOC What s a Firewall? Computer network security device to protect devices, or restrict access to or from a network Analyzes traffic coming in or going out (or

More information

Migrating the SSL Offloading Configuration of the Alteon Application Switch 2424-SSL to AlteonOS version 27.0.0.0

Migrating the SSL Offloading Configuration of the Alteon Application Switch 2424-SSL to AlteonOS version 27.0.0.0 Migrating the SSL Offloading Configuration of the Alteon Application Switch 2424-SSL to AlteonOS version 27.0.0.0 Table of Contents 1 Introduction... 1 2 Certificates Repository... 2 3 Common SSL Offloading

More information

Firewalls. Chien-Chung Shen cshen@cis.udel.edu

Firewalls. Chien-Chung Shen cshen@cis.udel.edu Firewalls Chien-Chung Shen cshen@cis.udel.edu The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective

More information

Smoothwall Web Filter Deployment Guide

Smoothwall Web Filter Deployment Guide Smoothwall Web Filter Deployment Guide v1.0.7 Copyright 2013 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org Software Versions

More information

EMG Ethernet Modbus Gateway User Manual

EMG Ethernet Modbus Gateway User Manual EMG Ethernet Modbus Gateway User Manual Rev 2.2 07/2010 CONTENTS 1. Introduction 1.1. General Features 1.2 Installing the Drivers 2. Configuration 2.1 Main Device Parameters 2.1.1 RS485 Serial Communication

More information

Configuration Worksheets for Oracle WebCenter Ensemble 10.3

Configuration Worksheets for Oracle WebCenter Ensemble 10.3 Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model

More information

PRM and DRBD tutorial. Yves Trudeau October 2012

PRM and DRBD tutorial. Yves Trudeau October 2012 PRM and DRBD tutorial Yves Trudeau October 2012 Agenda Introduction to Pacemaker PRM principle PRM Hands-on HA over shared storage What is DRBD? Impacts of DRBD on MySQL DRBD Hands-on About me Pacemaker

More information

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALLS & CBAC. philip.heimer@hh.se FIREWALLS & CBAC philip.heimer@hh.se Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that

More information

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring 2002. Four parts

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring 2002. Four parts CSE 123b Communications Software Spring 2002 Lecture 11: HTTP Stefan Savage Project #2 On the Web page in the next 2 hours Due in two weeks Project reliable transport protocol on top of routing protocol

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Appliance Quick Start Guide v8.1

Appliance Quick Start Guide v8.1 Appliance Quick Start Guide v8.1 rev. 1.0.0 Copyright 2002 2016 Loadbalancer.org, Inc Table of Contents About this Guide... 5 About the Appliance... 5 Appliance Configuration Overview... 5 Appliance Security...

More information

ClusterLoad ESX Virtual Appliance quick start guide v6.3

ClusterLoad ESX Virtual Appliance quick start guide v6.3 ClusterLoad ESX Virtual Appliance quick start guide v6.3 ClusterLoad terminology...2 What are your objectives?...3 What is the difference between a one-arm and a two-arm configuration?...3 What are the

More information

H3C SSL VPN Configuration Examples

H3C SSL VPN Configuration Examples H3C SSL VPN Configuration Examples Keywords: SSL, VPN, HTTPS, Web, TCP, IP Abstract: This document describes characteristics of H3C SSL VPN, details the basic configuration and configuration procedure

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

Divide and Conquer Real World Distributed Port Scanning

Divide and Conquer Real World Distributed Port Scanning Divide and Conquer Real World Distributed Port Scanning Ofer Maor CTO Hacktics 16 Feb 2006 Hackers & Threats I, 3:25PM (HT1-302) Introduction Divide and Conquer: Real World Distributed Port Scanning reviews

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015

Monitoring Android Apps using the logcat and iperf tools. 22 May 2015 Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis katsarakis@csd.uoc.gr Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android

More information

HighlyavailableiSCSIstoragewith DRBDandPacemaker

HighlyavailableiSCSIstoragewith DRBDandPacemaker HighlyavailableiSCSIstoragewith DRBDandPacemaker HighlyavailableiSCSIstoragewithDRBDandPacemaker Brian Hellman & Florian Haas Copyright 2009, 2010, 2011 LINBIT HA-Solutions GmbH Trademark notice DRBD and

More information

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways Deployment Guide rev. 1.4.9 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information

Load Balancing Barracuda Web Filter. Deployment Guide

Load Balancing Barracuda Web Filter. Deployment Guide Load Balancing Barracuda Web Filter Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30 logging enable logging console 4 logging timestamp logging trap 5 logging buffered 4 logging device id hostname logging host 10.0.128.240 udp/514 format emblem logging host 10.0.143.24 udp/514 login timeout

More information

Load Balancing Microsoft Terminal Services. Deployment Guide

Load Balancing Microsoft Terminal Services. Deployment Guide Load Balancing Microsoft Terminal Services Deployment Guide rev. 1.5.7 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Loadbalancer.org Appliances Supported... 4 Loadbalancer.org

More information

TCP Performance Management for Dummies

TCP Performance Management for Dummies TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

Web Load Balancing on a Budget

Web Load Balancing on a Budget Web Load Balancing on a Budget Pain Hosting 60+ websites Single web server Redundant subsystems (disk, power) SPOF Inconvenient maintenance windows Clients MY TEAM! Scope Simple. Availability. Minimize/mitigate

More information

PrintFleet Enterprise Security Overview

PrintFleet Enterprise Security Overview PrintFleet Inc. is committed to providing software products that are secure for use in all network environments. PrintFleet software products only collect the critical imaging device metrics necessary

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide

Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances

More information

Firewalls. Network Security. Firewalls Defined. Firewalls

Firewalls. Network Security. Firewalls Defined. Firewalls Network Security Firewalls Firewalls Types of Firewalls Screening router firewalls Computer-based firewalls Firewall appliances Host firewalls (firewalls on clients and servers) Inspection Methods Firewall

More information

DNS Update API November 15, 2006 Version 2.0.3

DNS Update API November 15, 2006 Version 2.0.3 DNS Update API November 15, 2006 Version 2.0.3 Dynamic Network Services, Inc. phone: +1-603-668-4998 1230 Elm Street, Fifth Floor fax: +1-603-668-6474 Manchester, NH 03101 www.dyndns.com Table of Contents

More information

EE0-511. Easy CramBible Lab DEMO ONLY VERSION EE0-511. F5 Big-Ip v9 Local Traffic Management

EE0-511. Easy CramBible Lab DEMO ONLY VERSION EE0-511. F5 Big-Ip v9 Local Traffic Management Easy CramBible Lab EE0-511 F5 Big-Ip v9 Local Traffic Management ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/ E-mail: web@crambible.com

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Kevin Butler Fall 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

ALOHA Load-Balancer. API objects. Document version: v2.0. API version concerned: v2.0. Aloha version concerned: Last update date: 24 th November, 2011

ALOHA Load-Balancer. API objects. Document version: v2.0. API version concerned: v2.0. Aloha version concerned: Last update date: 24 th November, 2011 ALOHA Load-Balancer API objects Document version: v2.0 API version concerned: v2.0 Aloha version concerned: v4.2.3 Last update date: 24 th November, 2011 [Sélectionnez la date] Sommaire L7 module objects...

More information

Appliance Quick Start Guide v6.21

Appliance Quick Start Guide v6.21 Appliance Quick Start Guide v6.21 Copyright 2014 Loadbalancer.org, Inc. Table of Contents Loadbalancer.org terminology... 4 What is a virtual IP address?... 4 What is a floating IP address?... 4 What

More information

TESTING & INTEGRATION GROUP SOLUTION GUIDE

TESTING & INTEGRATION GROUP SOLUTION GUIDE TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirecor optimizing the delivery of VMware View 4.5 Contents INTRODUCTION... 2 RADWARE APPDIRECTOR... 2 VMWARE VIEW... 2 RADWARE APPDIRECTOR AND VMWARE VIEW

More information

HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014

HAProxy. Free, Fast High Availability and Load Balancing. Adam Thornton 10 September 2014 HAProxy Free, Fast High Availability and Load Balancing Adam Thornton 10 September 2014 What? HAProxy is a proxy for Layer 4 (TCP) or Layer 7 (HTTP) traffic GPLv2 http://www.haproxy.org Disclaimer: I don't

More information

Scalable Linux Clusters with LVS

Scalable Linux Clusters with LVS Scalable Linux Clusters with LVS Considerations and Implementation, Part II Eric Searcy Tag1 Consulting, Inc. emsearcy@tag1consulting.com May 2008 Abstract Whether you are perusing mailing lists or reading

More information

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 1 Chapter 10 CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK Chapter 10: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 2 OVERVIEW Configure and troubleshoot the TCP/IP protocol Connect to a wireless

More information

Apache Tomcat Clustering

Apache Tomcat Clustering Apache Tomcat Clustering Mark Thomas, Staff Engineer 2012 SpringSource, by VMware. All rights reserved Agenda Introductions Terminology When to cluster Components Configuration choices Debugging Questions

More information

High Availability Low Dollar Clustered Storage

High Availability Low Dollar Clustered Storage High Availability Low Dollar Clustered Storage Simon Karpen skarpen@shodor.org / simon@karpens.org Thanks to Shodor for use of this space for the meeting. This document licensed under the Creative Commons

More information

Corso di Network Security a.a. 2012/2013. Collection of some exercises on the second part of the course

Corso di Network Security a.a. 2012/2013. Collection of some exercises on the second part of the course University of Parma Department of Information Engineering Corso di Network Security a.a. 2012/2013 Collection of some exercises on the second part of the course 1) Specify the name of the CHAP messages

More information

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Load Balancing Oracle Application Server (Oracle HTTP Server) Quick Reference Guide

Load Balancing Oracle Application Server (Oracle HTTP Server) Quick Reference Guide Load Balancing Oracle Application Server (Oracle HTTP Server) Quick Reference Guide v1.1.0 Oracle HTTP Server Ports By default Oracle HTTP Server listens on HTTP port 7777 and HTTPS is disabled. When HTTPS

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Spring 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

Ethernet Port Quick Start Manual

Ethernet Port Quick Start Manual Ethernet Port Quick Start Manual THIS MANUAL CONTAINS TECHNICAL INFORMATION FOR THE ETHERNET PORT OF EDI SIGNAL MONITORS with Ethernet Version 1.5 firmware. DETAILS OF THE ECCOM OPERATION ARE DESCRIBED

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255 SIP Traversal over NAT 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: wechen@niu.edu.tw TEL: 03-9357400 # 255 Outline Introduction to SIP and NAT NAT Problem Definition NAT Solutions on NTP VoIP

More information

Load Balancing VMware Horizon View. Deployment Guide

Load Balancing VMware Horizon View. Deployment Guide Load Balancing VMware Horizon View Deployment Guide v1.1.0 Copyright 2014 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Appliances Supported... 4 VMware Horizon View Versions Supported...4

More information

Scalable Linux Clusters with LVS

Scalable Linux Clusters with LVS Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. emsearcy@tag1consulting.com April 2008 Abstract Whether you are perusing mailing lists or reading

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

Load Balancing Microsoft Remote Desktop Services. Deployment Guide

Load Balancing Microsoft Remote Desktop Services. Deployment Guide Load Balancing Microsoft Remote Desktop Services Deployment Guide rev. 1.0.5 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Appliances Supported... 4 Microsoft Windows

More information

MONIT. UNIX Systems Management

MONIT. UNIX Systems Management MONIT UNIX Systems Management Introduction monit is a utility for managing and monitoring, processes, files, directories and devices on a Unix system. Monit conducts automatic maintenance and repair and

More information

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

ZCP trunk (build 50384) Zarafa Collaboration Platform. Zarafa HA Manual

ZCP trunk (build 50384) Zarafa Collaboration Platform. Zarafa HA Manual ZCP trunk (build 50384) Zarafa Collaboration Platform Zarafa HA Manual Zarafa Collaboration Platform ZCP trunk (build 50384) Zarafa Collaboration Platform Zarafa HA Manual Edition 2.0 Copyright 2015 Zarafa

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking

More information

Loadbalancer.org. Loadbalancer.org appliance quick setup guide. v6.6

Loadbalancer.org. Loadbalancer.org appliance quick setup guide. v6.6 Loadbalancer.org Loadbalancer.org appliance quick setup guide v6.6 1 Confidentiality Statement All information contained in this proposal is provided in confidence for the sole purpose of adjudication

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

Load Balancing Smoothwall Secure Web Gateway

Load Balancing Smoothwall Secure Web Gateway Load Balancing Smoothwall Secure Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org

More information

PrintFleet Enterprise 2.2 Security Overview

PrintFleet Enterprise 2.2 Security Overview PrintFleet Enterprise 2.2 Security Overview PageTrac Support PrintFleet Enterprise 2.2 Security Overview PrintFleet Inc. is committed to providing software products that are secure for use in all network

More information

CSC574 - Computer and Network Security Module: Firewalls

CSC574 - Computer and Network Security Module: Firewalls CSC574 - Computer and Network Security Module: Firewalls Prof. William Enck Spring 2013 1 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information